default search action
Ahmad Baraani-Dastjerdi
Person information
- affiliation: University of Isfahan, Iran
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j35]Azade Mohammadi, Reza Ramezani, Ahmad Baraani:
Topic-aware multi-hop machine reading comprehension using weighted graphs. Expert Syst. Appl. 224: 119873 (2023) - [j34]Mojtaba Hashemian, Shekoufeh Kolahdouz Rahimi, Ahmad Baraani-Dastgerdi:
An influences-adapted two-phase approach to stance detection in the diachronic perspective. Expert Syst. Appl. 231: 120773 (2023) - [j33]Zeinab Zare Hosseini, Shekoufeh Kolahdouz Rahimi, Esmaeil Forouzan, Ahmad Baraani:
Distributed RMI-DBG model: Scalable iterative de Bruijn graph algorithm for short read genome assembly problem. Expert Syst. Appl. 233: 120859 (2023) - 2022
- [j32]Fereshteh Khoshnam, Ahmad Baraani-Dastjerdi:
A dual framework for implicit and explicit emotion recognition: An ensemble of language models and computational linguistics. Expert Syst. Appl. 198: 116686 (2022) - [j31]Azadeh Givchi, Reza Ramezani, Ahmad Baraani-Dastjerdi:
Graph-based abstractive biomedical text summarization. J. Biomed. Informatics 132: 104099 (2022) - [i10]Fereshteh Khoshnam, Ahmad Baraani-Dastjerdi, M. J. Liaghatdar:
CEFER: A Four Facets Framework based on Context and Emotion embedded features for Implicit and Explicit Emotion Recognition. CoRR abs/2209.13999 (2022) - [i9]Azade Mohammadi, Reza Ramezani, Ahmad Baraani:
A Comprehensive Survey on Multi-hop Machine Reading Comprehension Datasets and Metrics. CoRR abs/2212.04070 (2022) - [i8]Azade Mohammadi, Reza Ramezani, Ahmad Baraani:
A Comprehensive Survey on Multi-hop Machine Reading Comprehension Approaches. CoRR abs/2212.04072 (2022) - 2021
- [j30]Mohammad Khodizadeh Nahari, Nasser Ghadiri, Ahmad Baraani-Dastjerdi, Jörg-Rüdiger Sack:
A novel similarity measure for spatial entity resolution based on data granularity model: Managing inconsistencies in place descriptions. Appl. Intell. 51(8): 6104-6123 (2021) - [j29]Alireza Khalilian, Ahmad Baraani-Dastjerdi, Bahman Zamani:
CGenProg: Adaptation of cartesian genetic programming with migration and opposite guesses for automatic repair of software regression faults. Expert Syst. Appl. 169: 114503 (2021) - [j28]Zeinab Zare Hosseini, Shekoufeh Kolahdouz Rahimi, Esmaeil Forouzan, Ahmad Baraani:
RMI-DBG algorithm: A more agile iterative de Bruijn graph algorithm in short read genome assembly. J. Bioinform. Comput. Biol. 19(2): 2150005:1-2150005:22 (2021) - 2020
- [j27]Mohammadreza Shams, Navid Khoshavi, Ahmad Baraani-Dastjerdi:
LISA: Language-Independent Method for Aspect-Based Sentiment Analysis. IEEE Access 8: 31034-31044 (2020) - [j26]Alireza Khalilian, Ahmad Baraani-Dastjerdi, Bahman Zamani:
APRSuite: A suite of components and use cases based on categorical decomposition of automatic program repair techniques and tools. J. Comput. Lang. 57: 100927 (2020)
2010 – 2019
- 2019
- [j25]Amirabbas Majd, Mojtaba Vahidi-Asl, Alireza Khalilian, Ahmad Baraani-Dastjerdi, Bahman Zamani:
Code4Bench: A multidimensional benchmark of Codeforces data for different program analysis techniques. J. Comput. Lang. 53: 38-52 (2019) - 2017
- [j24]Mohammadreza Shams, Ahmad Baraani-Dastjerdi:
Enriched LDA (ELDA): Combination of latent Dirichlet allocation with word co-occurrence analysis for aspect extraction. Expert Syst. Appl. 80: 136-146 (2017) - [j23]Maede Ashouri-Talouki, Ahmad Baraani-Dastjerdi:
Cryptographic collusion-resistant protocols for secure sum. Int. J. Electron. Secur. Digit. Forensics 9(1): 19-34 (2017) - [c18]Zahra Karimi Dehkordi, Ahmad Baraani-Dastjerdi, Nasser Ghasem-Aghaee, Stefan Wagner:
Links between the personalities, styles and performance in computer programming. Software Engineering 2017: 53-54 - 2016
- [j22]Abdolvahed Pari, Ahmad Baraani, Saeed Parseh:
NSAMD: A new approach to discover structured contiguous substrings in sequence datasets using Next-Symbol-Array. Comput. Biol. Chem. 64: 384-395 (2016) - [j21]Zahra Karimi Dehkordi, Ahmad Baraani-Dastjerdi, Nasser Ghasem-Aghaee, Stefan Wagner:
Using Personality Traits to Understand the Influence of Personality on Computer Programming: An Empirical Study. J. Cases Inf. Technol. 18(1): 28-48 (2016) - [j20]Zahra Karimi Dehkordi, Ahmad Baraani-Dastjerdi, Nasser Ghasem-Aghaee, Stefan Wagner:
Links between the personalities, styles and performance in computer programming. J. Syst. Softw. 111: 228-241 (2016) - [i7]Zahra Karimi Dehkordi, Ahmad Baraani-Dastjerdi, Nasser Ghasem-Aghaee, Stefan Wagner:
Links between the personalities, styles and performance in computer programming. CoRR abs/1611.10169 (2016) - 2015
- [j19]Faria Nassiri Mofakham, Mohammad Ali Nematbakhsh, Ahmad Baraani-Dastjerdi, Nasser Ghasem-Aghaee, Ryszard Kowalczyk:
Bidding strategy for agents in multi-attribute combinatorial double auction. Expert Syst. Appl. 42(6): 3268-3295 (2015) - [j18]Mohammad Zanjani, Ahmad Baraani-Dastjerdi, Ehsan Asgarian, Alireza Shahriyari, Amir Akhavan Kharazian:
A New Experience in Persian Text Clustering using FarsNet Ontology. J. Inf. Sci. Eng. 31(1): 315-330 (2015) - [j17]Zahra Karimi Dehkordi, Ahmad Baraani-Dastjerdi, Nasser Ghasem-Aghaee, Stefan Wagner:
Influence of Personality on Programming Styles an Empirical Study. J. Inf. Technol. Res. 8(4): 38-56 (2015) - [j16]Maede Ashouri-Talouki, Ahmad Baraani-Dastjerdi, Ali Aydin Selçuk:
The Cloaked-Centroid protocol: location privacy protection for a group of users of location-based services. Knowl. Inf. Syst. 45(3): 589-615 (2015) - 2014
- [i6]Saeed Parseh, Ahmad Baraani:
Improving Persian Document Classification Using Semantic Relations between Words. CoRR abs/1412.8147 (2014) - 2013
- [j15]Mehdi Bateni, Ahmad Baraani, Ali A. Ghorbani:
Using Artificial Immune System and Fuzzy Logic for Alert Correlation. Int. J. Netw. Secur. 15(3): 190-204 (2013) - 2012
- [j14]Maede Ashouri-Talouki, Ahmad Baraani-Dastjerdi, Ali Aydin Selçuk:
GLP: A cryptographic approach for group location privacy. Comput. Commun. 35(12): 1527-1533 (2012) - [j13]Mehdi Bateni, Ahmad Baraani, Ali A. Ghorbani:
Alert correlation using artificial immune recognition system. Int. J. Bio Inspired Comput. 4(3): 181-195 (2012) - [j12]Hanieh Jalali, Ahmad Baraani:
Process Aware Host-based Intrusion Detection Model. Int. J. Commun. Networks Inf. Secur. 4(2) (2012) - [c17]S. D. Sepehr, Naser Movahhedinia, Ahmad Baraani:
Investigating QoS support in WiMAX over Metro-Ethernet backhaul. DICTAP 2012: 36-41 - 2011
- [j11]Nayereh Ghahreman, Ahmad Baraani-Dastjerdi:
Semi-Automatic Labeling of Training Data Sets in Text Classification. Comput. Inf. Sci. 4(6): 48-56 (2011) - [j10]Nasser Ghadiri, Ahmad Baraani-Dastjerdi, Nasser Ghasem-Aghaee, Mohammad Ali Nematbakhsh:
GREST - a type-2 fuzzy distance model for group nearest-neighbor queries. J. Intell. Fuzzy Syst. 22(5-6): 217-236 (2011) - [j9]Omid Roozmand, Nasser Ghasem-Aghaee, Gert Jan Hofstede, Mohammad Ali Nematbakhsh, Ahmad Baraani-Dastjerdi, Tim Verwaart:
Agent-based modeling of consumer decision making process based on power distance and personality. Knowl. Based Syst. 24(7): 1075-1095 (2011) - [j8]Nasser Ghadiri, Ahmad Baraani-Dastjerdi, Nasser Ghasem-Aghaee, Mohammad Ali Nematbakhsh:
Optimizing the performance and robustness of type-2 fuzzy group nearest-neighbor queries. Mob. Inf. Syst. 7(2): 123-145 (2011) - [i5]Nasser Ghadiri, Ahmad Baraani-Dastjerdi, Nasser Ghasem-Aghaee, Mohammad Ali Nematbakhsh:
A Human-Centric Approach to Group-Based Context-Awareness. CoRR abs/1101.5460 (2011) - [i4]Arezoo Rajaei, Ahmad Baraani-Dastjerdi, Nasser Ghasem-Aghaee:
An Extension of Semantic Proximity for Fuzzy Multivalued Dependencies in Fuzzy Relational Database. CoRR abs/1109.1168 (2011) - [i3]Ali Karami, Ahmad Baraani-Dastjerdi:
A Concurrency Control Method Based on Commitment Ordering in Mobile Databases. CoRR abs/1112.2155 (2011) - [i2]Nasrin Mazaheri Soudani, Ahmad Baraani-Dastgerdi:
The Spatial Nearest Neighbor Skyline Queries. CoRR abs/1112.2336 (2011) - 2010
- [j7]Saeed Farzi, Ahmad Baraani-Dastjerdi:
Leaf constrained minimal spanning trees solved by modified quantum-behaved particle swarm optimization. Artif. Intell. Rev. 34(1): 1-17 (2010) - [c16]Ehsan KhounSiavash, Ahmad Baraani-Dastjerdi:
Using the whole structure of ontology for semantic relatedness measurement. SEKE 2010: 79-83 - [c15]Elahe Najafi, Ahmad Baraani:
KASRA Framework: A Service Oriented Enterprise Architecture Framework (SOEAF). SERVICES 2010: 172-173 - [c14]Zahra Karimi Dehkordi, Kamran Zamanifar, Ahmad Baraani-Dastjerdi, Nasser Ghasem-Aghaee:
Sudoku Using Parallel Simulated Annealing. ICSI (2) 2010: 461-467 - [c13]Ehsan KhounSiavash, Ahmad Baraani-Dastjerdi:
Using the Density of Paths for Semantic Relatedness Measurement. SWWS 2010: 18-24
2000 – 2009
- 2009
- [j6]Faria Nassiri Mofakham, Mohammad Ali Nematbakhsh, Nasser Ghasem-Aghaee, Ahmad Baraani-Dastjerdi:
A heuristic personality-based bilateral multi-issue bargaining model in electronic commerce. Int. J. Hum. Comput. Stud. 67(1): 1-35 (2009) - [j5]Faria Nassiri Mofakham, Mohammad Ali Nematbakhsh, Ahmad Baraani-Dastjerdi, Nasser Ghasem-Aghaee:
Electronic promotion to new customers using mk. Inf. Sci. 179(3): 248-266 (2009) - [j4]Siyamand Ayubi, Maybin K. Muyeba, Ahmad Baraani-Dastjerdi, John A. Keane:
An algorithm to mine general association rules from tabular data. Inf. Sci. 179(20): 3520-3539 (2009) - [c12]Shaghayegh Bakhtiari, Ahmad Baraani, Mohammad Reza Khayyambashi:
MobiCash: A New Anonymous Mobile Payment System Implemented by Elliptic Curve Cryptography. CSIE (3) 2009: 286-290 - [i1]Mohsen Lashkargir, S. Amirhassan Monadjemi, Ahmad Baraani-Dastjerdi:
A Hybrid Multi Objective Particle Swarm Optimization Method to Discover Biclusters in Microarray Data. CoRR abs/0909.1405 (2009) - 2008
- [c11]Faria Nassiri Mofakham, Mohammad Ali Nematbakhsh, Ahmad Baraani-Dastjerdi, Nasser Ghasem-Aghaee:
One Step beyond Nash Equilibrium. CSC 2008: 186-192 - 2007
- [j3]Omid Roozmand, Mohammad Ali Nematbakhsh, Ahmad Baraani-Dastjerdi:
An Electronic Marketplace Based on Reputation and Learning. J. Theor. Appl. Electron. Commer. Res. 2(1): 1-17 (2007) - [c10]Faria Nassiri Mofakham, Mohammad Ali Nematbakhsh, Ahmad Baraani-Dastjerdi, Nasser Ghasem-Aghaee:
Electronic Promotion to New Customers using a Fixed link mkNN Learning. CSREA EEE 2007: 20-27 - [c9]Nasser Ghadiri, Mohammad Ali Nematbakhsh, Ahmad Baraani-Dastjerdi, Nasser Ghasem-Aghaee:
A Context-Aware Service Discovery Framework Based on Human Needs Model. ICSOC 2007: 404-409 - [c8]Siyamand Ayubi, Ahmad Baraani-Dastjerdi, Maybin K. Muyeba:
An Efficient Classifier Using Decision Trees and Association Rules. ICDM (Posters and Workshops) 2007: 1-12 - [c7]Siyamand Ayubi, Ahmad Baraani-Dastjerdi, Amir Hassan Monadjemi, Maybin K. Muyeba:
A Novelty Detection Method Based on Frequent Itemsets. MLDM Posters 2007: 276-286 - 2005
- [c6]Rahil Garnavi, Ahmad Baraani-Dastjerdi, Hamid Abrishami Moghaddam, Masoomeh Giti, Ali Ajdari Rad:
A New Segmentation Method for Lung HRCT Images. DICTA 2005: 52 - [c5]Shahram Esteki, Naser Movahhedinia, Ahmad Baraani:
Fast approximation of anti-random sequence generator for stream ciphering. ICC 2005: 871-874
1990 – 1999
- 1997
- [j2]Ahmad Baraani-Dastjerdi, Josef Pieprzyk, Reihaneh Safavi-Naini:
A Multi-Level View Model for Secure Object-Oriented Databases. Data Knowl. Eng. 23(2): 97-117 (1997) - [j1]Ahmad Baraani-Dastjerdi, Josef Pieprzyk, Reihaneh Safavi-Naini, Janusz R. Getta:
Using Cryptographic Hash Functions for Discretionary Access Control in Object-Oriented Databases. J. Univers. Comput. Sci. 3(6): 730-753 (1997) - 1996
- [c4]Ahmad Baraani-Dastjerdi, Josef Pieprzyk, Reihaneh Safavi-Naini:
Modeling a multi-level secure object-oriented database using views. ACISP 1996: 190-206 - 1995
- [c3]Ahmad Baraani-Dastjerdi, Janusz R. Getta, Josef Pieprzyk, Reihaneh Safavi-Naini:
A Cryptographic Solution to Discretionary Access Control in Structurally Object-Oriented Databases. Australasian Database Conference 1995 - [c2]Ahmad Baraani-Dastjerdi, Josef Pieprzyk, Reihaneh Safavi-Naini, Janusz R. Getta:
A Model of Authorization for Object-Oriented Databases based on Object Views. DOOD 1995: 503-520 - [c1]Ahmad Baraani-Dastjerdi, Josef Pieprzyk, Reihaneh Safavi-Naini, Janusz R. Getta:
A Cryptographic Mechanism for Object-Instance-Based Authorization in Object-Oriented Database Systems. OOER 1995: 44-54
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:41 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint